TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA

CSV information ?

Status active
Valid from 18.11.2016
Valid until 18.11.2026
Scheme 🇩🇪 DE
Manufacturer T-Systems International GMBH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4+, AVA_VAN.5

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0957-V2-2016

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, CMAC
Asymmetric Algorithms
ECDSA, ECC, DH, Diffie-Hellman
Schemes
MAC, Key Agreement, KA
Protocols
TLS, PACE
Randomness
RNG
Engines
SmartMX2
Block cipher modes
CBC

Vendor
NXP, NXP Semiconductors

Security level
EAL 4, EAL 5, EAL 1, EAL 2, EAL 5+, EAL 6, EAL 3, EAL 7, EAL 4 augmented, ITSEC Evaluation
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSS
Security Functional Requirements (SFR)
FCS_COP, FCS_CKM, FCS_RNG.1, FIA_UID.1, FIA_UAU.4, FIA_UAU.5, FTP_ITC.1
Protection profiles
BSI-CC-PP-0077-V2-2015
Certificates
BSI-DSZ-CC-0957-2015, BSI-DSZ-CC-0978-2016, BSI-DSZ-CC-0957-V2-2016
Evaluation facilities
TĂśV Informationstechnik, SRC Security Research & Consulting, T-Systems International
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, 1.0 Release 2/P60C144PVE, Version 1.2, 27 October 2016, SRC Security Research & Consulting GmbH (confidential document) 9 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung, Version 1.0 Release 2/P60C144PVE, Version 1.3, 25 October 2016, T-Systems International GmbH (confidential document) [10] Guidance Documentation BSI-DSZ-CC-0957-V2-2016, Operational Guidance for users and, Y/B/X)/yVE, BSI-DSZ-CC-0978, Version 2, 17 December 2015, TÜV Informationstechnik GmbH (confidential document) [14] Product Data Sheet, SmartMX2 family P60x080/144 VA/VE, Secure high performance smart card

Side-channel analysis
side channel, malfunction, fault injection, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, 1.0 Release 2/P60C144PVE, Version 1.2, 27 October 2016, SRC Security Research & Consulting GmbH (confidential document) 9 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung, Version 1.0 Release 2/P60C144PVE, Version 1.3, 25 October 2016, T-Systems International GmbH (confidential document) [10] Guidance Documentation BSI-DSZ-CC-0957-V2-2016, Operational Guidance for users and, Y/B/X)/yVE, BSI-DSZ-CC-0978, Version 2, 17 December 2015, TÜV Informationstechnik GmbH (confidential document) [14] Product Data Sheet, SmartMX2 family P60x080/144 VA/VE, Secure high performance smart card

Standards
FIPS 180-2, FIPS 186, FIPS 197, AIS 34, AIS 36, AIS 26, AIS 25, AIS 20, AIS 1, AIS 31, AIS 32, AIS 46, RFC 5639, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI TR-03109-2, BSI 7148

File metadata

Title: Certification Report BSI-DSZ-CC-0957-V2-2016
Subject: Common Criteria Certification
Keywords: "Common Criteria, Certification, Zertifizierung, Smart Meter Security Module"
Author: Bundesamt fĂĽr Sicherheit ind er Informationstechnik
Creation date: D:20161202073353+01'00'
Modification date: D:20161202075632+01'00'
Pages: 38
Creator: Writer
Producer: LibreOffice 4.2

Frontpage

Certificate ID: BSI-DSZ-CC-0957-V2-2016
Certified item: TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE
Certification lab: BSI
Developer: T-Systems International GmbH

References

Outgoing
  • BSI-DSZ-CC-0978-2016 - NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software
  • BSI-DSZ-CC-0957-2015 - TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA
Incoming

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, TDES, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-Hellman
Schemes
MAC, Key Agreement
Protocols
TLS, PACE
Randomness
RND, RNG
Elliptic Curves
P-256, P-384, NIST P-256, NIST P-384, secp256r1, secp384r1, brainpoolP256r1, brainpoolP384r1, brainpoolP512r1
Block cipher modes
CBC

Vendor
NXP, NXP Semiconductors

Security level
EAL4, EAL 6+, EAL 4, EAL 6, EAL4 augmented, EAL 6 augmented
Claims
O.PACE, O.RND, O.HW_AES, O.MEM_ACCESS, O.SFR_ACCESS, O.FW_HW, T.RND, OE.PACE, OSP.SM
Security Assurance Requirements (SAR)
ADV_TDS, ADV_ARC, ADV_FSP, ADV_IMP.1, ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, AGD_PRE.1, AGD_OPE.1, ALC_FLR.1, ALC_DEL.1, ALC_CMC.4, ALC_CMS.4, ALC_LCD.1, ALC_TAT.1, ALC_DVS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, AVA_VAN.5, ASE_TSS.2
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4.1, FDP_ACF, FDP_ACC.2, FDP_ACF.1, FDP_SDI.2, FDP_RIP.1, FDP_ETC.1, FDP_ITC.1, FDP_UCT.1, FDP_UIT.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_RIP.1.1, FDP_IFC, FDP_ETC.1.1, FDP_ETC.1.2, FDP_IFC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UIT.1.2, FDP_ITC, FDP_SDI, FDP_RIP, FDP_UIT, FDP_ITT.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU, FIA_UAU.4, FIA_UAU.5, FIA_UID.1, FIA_USB.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_SOS, FIA_UID, FIA_USB, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMR, FMT_MSA.1, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_PHP.3, FPT_TST.1, FPT_FLS.1.1, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_PHP, FPT_TST, FPT_ITT.1, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_ICT.1, FTP_ITC
Protection profiles
BSI-CC-PP-0077-V2-2015, BSI-CC-PP-0035-2007, BSI-CC-PP-0073-2014
Certificates
BSI-DSZ-CC-0978-2016, BSI-DSZ-CC-0957-V2
Evaluation facilities
T-Systems International
Certification process
out of scope, entities. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 73 During its pre-operational phases the TOE interacts with the Integrator and the

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channels, side channel, side-channels, SPA, DPA, timing attacks, Physical tampering, physical tampering, Malfunction, malfunction, DFA, fault injection
Certification process
out of scope, entities. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 73 During its pre-operational phases the TOE interacts with the Integrator and the

Standards
FIPS186, FIPS197, FIPS PUB 186-4, AIS36, AIS 36, RFC5639, RFC 5639, ISO/IEC 7810:2003, X.509, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004
Technical reports
BSI TR-03109

File metadata

Title: Security Target TCOS Smart Meter Security Module (NXP)
Subject: TCOS Smart Meter Security Module Version 1.0 Release 1
Keywords: "TCOS Security Module, Sicherheitsmodul, Smart Meter"
Author: T-Systems International GmbH
Creation date: D:20161026142017+02'00'
Modification date: D:20161026142017+02'00'
Pages: 76
Creator: Microsoft® Office Word 2007
Producer: Microsoft® Office Word 2007

References

Outgoing
  • BSI-DSZ-CC-0978-2016 - NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software
Incoming

Heuristics ?

Certificate ID: BSI-DSZ-CC-0957-V2-2016

Extracted SARs

APE_INT.1, ALC_DVS.1, APE_ECD.1, APE_CCL.1, ATE_FUN.1, ALC_TAT.1, ATE_DPT.1, APE_REQ.2, ASE_CCL.1, ASE_INT.1, ADV_TDS.3, ALC_LCD.1, APE_OBJ.2, ASE_REQ.2, ASE_SPD.1, APE_SPD.1, ALC_CMS.4, ALC_DEL.1, AVA_VAN.5, ALC_FLR.1, ADV_SPM.1, ASE_TSS.2, AGD_PRE.1, ASE_OBJ.2, AGD_OPE.1, ALC_CMC.4, ATE_IND.3, ADV_INT.3, ADV_IMP.1, ASE_ECD.1, ADV_FSP.4, ATE_COV.2, ADV_ARC.1

Scheme data ?

Cert Id BSI-DSZ-CC-0957-V2-2016
Product TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE
Vendor Deutsche Telekom Security GmbH
Certification Date 18.11.2016
Category Intelligent measuring systems
Url https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Smartmeter_Sicherheitsmodule/0957_0957V2_0957V2RA1.html
Enhanced
Product TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE
Applicant Deutsche Telekom Security GmbH Untere IndustriestraĂźe 20 57250 Netphen
Evaluation Facility SRC Security Research & Consulting GmbH
Assurance Level EAL4+,AVA_VAN.5
Protection Profile Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) - Schutzprofil fĂĽr das Sicherheitsmodul der Kommunikationseinheit eines intelligenten Messsystems fĂĽr Stoff- und Energiemengen Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015
Certification Date 18.11.2016
Expiration Date 17.11.2026
Entries [frozendict({'id': 'BSI-DSZ-CC-0957-V2-2016-RA-01 (Ausstellungsdatum / Certification Date 27.09.2021)', 'description': 'Re-Assessment'}), frozendict({'id': 'BSI-DSZ-CC-0957-V2-2016 (Ausstellungsdatum / Certification Date 18.11.2016, gĂĽltig bis / valid until 17.11.2026)', 'description': 'TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE'}), frozendict({'id': 'BSI-DSZ-CC-0957-2015 (Ausstellungsdatum / Certification Date 09.02.2015, gĂĽltig bis / valid until 09.02.2025)', 'description': 'Security Target'})]
Report Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0957V2a_pdf.pdf?__blob=publicationFile&v=1
Target Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0957V2b_pdf.pdf?__blob=publicationFile&v=1
Description The Target of Evaluation (TOE) is the product TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA developed by T-Systems International GmbH. The TOE is a Smart Meter Security Module according to the Technical Guideline BSI TR-03109-2, Version 1.1 intended to be used by a Smart Meter Gateway in a Smart Metering System. The TOE serves as cryptographic service provider for the Smart Meter Gateway and supports the Smart Meter Gateway for its specific cryptographic needs. These cryptographic services cover the following issues: Digital Signature Generation, Digital Signature Verification, Key Agreement for TLS, Key Agreement for Content Data Encryption, Key Pair Generation, Random Number Generation, Component Authentication via the PACE Protocol with Negotiation of Session Keys, Secure Messaging, and Secure Storage of Key Material and further data relevant for the Gateway.
Subcategory Security module for an Smart Metering Gateway

References ?

Updates ?

  • 21.09.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'cert_id': 'BSI-DSZ-CC-0957-V2-2016', 'product': 'TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE', 'vendor': 'Deutsche Telekom Security GmbH', 'certification_date': '18.11.2016', 'category': 'Intelligent measuring systems', 'url': 'https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Smartmeter_Sicherheitsmodule/0957_0957V2_0957V2RA1.html', 'enhanced': {'__update__': {'product': 'TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE', 'applicant': 'Deutsche Telekom Security GmbH\nUntere IndustriestraĂźe 20\n57250 Netphen', 'assurance_level': 'EAL4+,AVA_VAN.5', 'protection_profile': 'Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) - Schutzprofil fĂĽr das Sicherheitsmodul der Kommunikationseinheit eines intelligenten Messsystems fĂĽr Stoff- und Energiemengen Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015', 'certification_date': '18.11.2016', 'expiration_date': '17.11.2026', 'entries': {'1': {'__update__': {'id': 'BSI-DSZ-CC-0957-V2-2016 (Ausstellungsdatum / Certification Date 18.11.2016, gĂĽltig bis / valid until 17.11.2026)', 'description': 'TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE'}}, '2': {'__update__': {'id': 'BSI-DSZ-CC-0957-2015 (Ausstellungsdatum / Certification Date 09.02.2015, gĂĽltig bis / valid until 09.02.2025)', 'description': 'Security Target'}}, '__insert__': [[0, {'id': 'BSI-DSZ-CC-0957-V2-2016-RA-01 (Ausstellungsdatum / Certification Date 27.09.2021)', 'description': 'Re-Assessment'}]]}, 'report_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0957V2a_pdf.pdf?__blob=publicationFile&v=1', 'target_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0957V2b_pdf.pdf?__blob=publicationFile&v=1', 'description': 'The Target of Evaluation (TOE) is the product TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA developed by T-Systems International GmbH. The TOE is a Smart Meter Security Module according to the Technical Guideline BSI TR-03109-2, Version 1.1 intended to be used by a Smart Meter Gateway in a Smart Metering System. The TOE serves as cryptographic service provider for the Smart Meter Gateway and supports the Smart Meter Gateway for its specific cryptographic needs. These cryptographic services cover the following issues: Digital Signature Generation, Digital Signature Verification, Key Agreement for TLS, Key Agreement for Content Data Encryption, Key Pair Generation, Random Number Generation, Component Authentication via the PACE Protocol with Negotiation of Session Keys, Secure Messaging, and Secure Storage of Key Material and further data relevant for the Gateway.'}, '__delete__': ['cert_link']}, 'subcategory': 'Security module for an Smart Metering Gateway'} data.
  • 20.06.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0822-V4-2023', 'BSI-DSZ-CC-0918-V5-2023']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0822-V4-2023', 'BSI-DSZ-CC-0918-V5-2023']}}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V5-2023']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V5-2023']}}} data.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'cert_id': 'BSI-DSZ-CC-1118-2020', 'product': 'TCOS CSP Module Version 1.0 Release 1/P6022y', 'vendor': 'T-Systems International GmbH', 'certification_date': '07.04.2020', 'category': 'Smart Cards and similar devices', 'url': 'https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_Betriebssysteme_Anwendungen/1118.html', 'enhanced': {'product': 'TCOS CSP Module Version 1.0 Release 1/P6022y', 'applicant': 'T-Systems International GmbH\nUntere IndustriestraĂźe 20\n57250 Netphen', 'evaluation_facility': 'SRC Security Research & Consulting GmbH', 'assurance_level': 'EAL4+,ALC_DVS.2,AVA_VAN.5', 'protection_profile': 'Cryptographic Service Provider (CSP) Version 0.9.8, 19 February 2019, BSI-CC-PP-0104-2019Protection Profile Configuration Cryptographic Service Provider – Time Stamp Service and Audit (PPC-CSP-TS-Au) Version 0.9.5, 8 April 2019, BSI-CC-PP-0107-2019', 'certification_date': '07.04.2020', 'expiration_date': '06.04.2025', 'entries': [{'id': 'Cryptographic Service Provider (', 'description': ') Version 0.9.8, 19 February 2019'}, {'id': 'Protection Profile Configuration Cryptographic Service Provider – Time Stamp Service and Audit (PPC-', 'description': '-Au) Version 0.9.5, 8 April 2019'}], 'report_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1118a_pdf.pdf?__blob=publicationFile&v=1', 'target_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1118b_pdf.pdf?__blob=publicationFile&v=1', 'cert_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1118c_pdf.pdf?__blob=publicationFile&v=1', 'description': 'The Target of Evaluation (TOE) is a Cryptographic Service Provider (CSP) representing a smart card with contact based interfaces programmed according to the Protection Profile BSI-CC-PP-0104-2019 in conjunction with the Timestamp and Audit functionality Protection Profile BSI-CC-PP-0107-2019.'}, 'subcategory': 'Operating systems and applications'}}.
    • The report_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V5-2022']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V5-2022']}}} data.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 998bd15748d1ca2359fcdbb3bb287968e27f6dad0982e89e20dccc1a6e8f6195.
    • The st_txt_hash property was set to e374f5f87c0e498be7ed75904e3410f87e9b6a3a15ce2509a20df4ddf2ed7677.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1152948, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 76, '/Title': 'Security Target TCOS Smart Meter Security Module (NXP)', '/Author': 'T-Systems International GmbH', '/Subject': 'TCOS Smart Meter Security Module Version 1.0 Release 1', '/Keywords': '"TCOS Security Module, Sicherheitsmodul, Smart Meter"', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': "D:20161026142017+02'00'", '/ModDate': "D:20161026142017+02'00'", '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.phy.duke.edu/~rgb/General/dieharder/dieharder-3.31.0.tgz', 'http://csrc.nist.gov/groups/ST/toolkit/rng/documents/sts-2.1.1.zip']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0978-2016': 2, 'BSI-DSZ-CC-0957-V2': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0077-V2-2015': 2, 'BSI-CC-PP-0035-2007': 1, 'BSI-CC-PP-0073-2014': 1}}, 'cc_security_level': {'EAL': {'EAL4': 4, 'EAL 6+': 1, 'EAL 4': 5, 'EAL 6': 1, 'EAL4 augmented': 3, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_TDS': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP.1': 3, 'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_PRE.1': 3, 'AGD_OPE.1': 1}, 'ALC': {'ALC_FLR.1': 2, 'ALC_DEL.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.5': 10}, 'ASE': {'ASE_TSS.2': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1}, 'FCS': {'FCS_RNG': 6, 'FCS_RNG.1': 20, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 51, 'FCS_CKM.4': 45, 'FCS_COP': 59, 'FCS_CKM.1': 16, 'FCS_CKM.2': 8, 'FCS_COP.1': 15, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACF': 2, 'FDP_ACC.2': 17, 'FDP_ACF.1': 9, 'FDP_SDI.2': 8, 'FDP_RIP.1': 7, 'FDP_ETC.1': 7, 'FDP_ITC.1': 20, 'FDP_UCT.1': 8, 'FDP_UIT.1': 7, 'FDP_ITC.2': 14, 'FDP_ACC.1': 13, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_SDI.1': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_RIP.1.1': 1, 'FDP_IFC': 1, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_IFC.1': 8, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_UIT.1.2': 1, 'FDP_ITC': 8, 'FDP_SDI': 1, 'FDP_RIP': 1, 'FDP_UIT': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_ATD.1': 10, 'FIA_SOS.1': 3, 'FIA_UAU': 18, 'FIA_UAU.4': 6, 'FIA_UAU.5': 6, 'FIA_UID.1': 14, 'FIA_USB.1': 6, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1': 5, 'FIA_UAU.4.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_SOS': 1, 'FIA_UID': 1, 'FIA_USB': 1}, 'FMT': {'FMT_LIM': 6, 'FMT_LIM.1': 25, 'FMT_LIM.2': 23, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMF.1': 10, 'FMT_SMR.1': 6, 'FMT_MSA.3': 6, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMR': 1, 'FMT_MSA.1': 2}, 'FPT': {'FPT_EMS': 6, 'FPT_EMS.1': 15, 'FPT_EMS.1.1': 2, 'FPT_EMS.1.2': 2, 'FPT_FLS.1': 11, 'FPT_PHP.3': 10, 'FPT_TST.1': 7, 'FPT_FLS.1.1': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 1, 'FPT_PHP': 1, 'FPT_TST': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1': 10, 'FTP_TRP.1': 4, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_ICT.1': 4, 'FTP_ITC': 1}}, 'cc_claims': {'O': {'O.PACE': 5, 'O.RND': 3, 'O.HW_AES': 4, 'O.MEM_ACCESS': 3, 'O.SFR_ACCESS': 3, 'O.FW_HW': 1}, 'T': {'T.RND': 1}, 'OE': {'OE.PACE': 1}, 'OSP': {'OSP.SM': 1}}, 'vendor': {'NXP': {'NXP': 2, 'NXP Semiconductors': 1}}, 'eval_facility': {'TSystems': {'T-Systems International': 79}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 16}}, 'DES': {'DES': {'DES': 4}, '3DES': {'Triple-DES': 2, 'TDES': 3}}, 'constructions': {'MAC': {'CMAC': 4}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 19}, 'ECC': {'ECC': 11}}, 'FF': {'DH': {'DH': 13, 'Diffie-Hellman': 5}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KA': {'Key Agreement': 17}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 28}}, 'PACE': {'PACE': 66}}, 'randomness': {'RNG': {'RND': 4, 'RNG': 8}}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {'NIST': {'P-256': 11, 'P-384': 15, 'NIST P-256': 1, 'NIST P-384': 1, 'secp256r1': 1, 'secp384r1': 1}, 'Brainpool': {'brainpoolP256r1': 2, 'brainpoolP384r1': 2, 'brainpoolP512r1': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 4, 'Physical Probing': 2, 'physical probing': 2, 'side channels': 1, 'side channel': 1, 'side-channels': 1, 'SPA': 2, 'DPA': 2, 'timing attacks': 1}, 'FI': {'Physical tampering': 1, 'physical tampering': 5, 'Malfunction': 12, 'malfunction': 3, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03109': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS186': 10, 'FIPS197': 3, 'FIPS PUB 186-4': 1}, 'BSI': {'AIS36': 3, 'AIS 36': 1}, 'RFC': {'RFC5639': 11, 'RFC 5639': 1}, 'ISO': {'ISO/IEC 7810:2003': 1}, 'X509': {'X.509': 2}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'entities. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 73 During its pre-operational phases the TOE interacts with the Integrator and the': 1}}}.
    • The st_filename property was set to 0957V2b_pdf.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V3-2022', 'BSI-DSZ-CC-0919-V2-2021']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V3-2022', 'BSI-DSZ-CC-0919-V2-2021']}}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0978-2016']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0978-2016']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0957V2b_pdf.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0919-V2-2021']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V4-2022', 'BSI-DSZ-CC-0918-2020']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0919-V2-2021']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V4-2022', 'BSI-DSZ-CC-0918-2020']}}} data.
    • The report_references property was updated, with the {'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0978-2016']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0978-2016']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V3-2022', 'BSI-DSZ-CC-0918-V4-2022', 'BSI-DSZ-CC-0918-2020']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V3-2022', 'BSI-DSZ-CC-0918-V4-2022', 'BSI-DSZ-CC-0918-2020']}}, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0978-2016']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0978-2016']}}} data.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0666-2012']}}} data.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The manufacturer_web was updated.

    • The new value is https://www.t-systems.de/.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) - ...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0077V2b_pdf.pdf', 'pp_ids': None}]}.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V3-2022', 'BSI-DSZ-CC-0918-V4-2022']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V3-2022', 'BSI-DSZ-CC-0918-V4-2022']}}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V3-2021']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V3-2021']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0666-2012']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP_SECURITYMODULEV2', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 998bd15748d1ca2359fcdbb3bb287968e27f6dad0982e89e20dccc1a6e8f6195.
    • The st_txt_hash property was set to e374f5f87c0e498be7ed75904e3410f87e9b6a3a15ce2509a20df4ddf2ed7677.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1152948, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 76, '/Title': 'Security Target TCOS Smart Meter Security Module (NXP)', '/Author': 'T-Systems International GmbH', '/Subject': 'TCOS Smart Meter Security Module Version 1.0 Release 1', '/Keywords': '"TCOS Security Module, Sicherheitsmodul, Smart Meter"', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': "D:20161026142017+02'00'", '/ModDate': "D:20161026142017+02'00'", '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.phy.duke.edu/~rgb/General/dieharder/dieharder-3.31.0.tgz', 'http://csrc.nist.gov/groups/ST/toolkit/rng/documents/sts-2.1.1.zip']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0978-2016': 2, 'BSI-DSZ-CC-0957-V2': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0077-V2-2015': 2, 'BSI-CC-PP-0035-2007': 1, 'BSI-CC-PP-0073-2014': 1}}, 'cc_security_level': {'EAL': {'EAL4': 4, 'EAL 6+': 1, 'EAL 4': 5, 'EAL 6': 1, 'EAL4 augmented': 3, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_TDS': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP.1': 3, 'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_PRE.1': 3, 'AGD_OPE.1': 1}, 'ALC': {'ALC_FLR.1': 2, 'ALC_DEL.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.5': 10}, 'ASE': {'ASE_TSS.2': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1}, 'FCS': {'FCS_RNG': 6, 'FCS_RNG.1': 20, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 51, 'FCS_CKM.4': 45, 'FCS_COP': 59, 'FCS_CKM.1': 16, 'FCS_CKM.2': 8, 'FCS_COP.1': 15, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACF': 2, 'FDP_ACC.2': 17, 'FDP_ACF.1': 9, 'FDP_SDI.2': 8, 'FDP_RIP.1': 7, 'FDP_ETC.1': 7, 'FDP_ITC.1': 20, 'FDP_UCT.1': 8, 'FDP_UIT.1': 7, 'FDP_ITC.2': 14, 'FDP_ACC.1': 13, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_SDI.1': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_RIP.1.1': 1, 'FDP_IFC': 1, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_IFC.1': 8, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_UIT.1.2': 1, 'FDP_ITC': 8, 'FDP_SDI': 1, 'FDP_RIP': 1, 'FDP_UIT': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_ATD.1': 10, 'FIA_SOS.1': 3, 'FIA_UAU': 18, 'FIA_UAU.4': 6, 'FIA_UAU.5': 6, 'FIA_UID.1': 14, 'FIA_USB.1': 6, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1': 5, 'FIA_UAU.4.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_SOS': 1, 'FIA_UID': 1, 'FIA_USB': 1}, 'FMT': {'FMT_LIM': 6, 'FMT_LIM.1': 25, 'FMT_LIM.2': 23, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMF.1': 10, 'FMT_SMR.1': 6, 'FMT_MSA.3': 6, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMR': 1, 'FMT_MSA.1': 2}, 'FPT': {'FPT_EMS': 6, 'FPT_EMS.1': 15, 'FPT_EMS.1.1': 2, 'FPT_EMS.1.2': 2, 'FPT_FLS.1': 11, 'FPT_PHP.3': 10, 'FPT_TST.1': 7, 'FPT_FLS.1.1': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 1, 'FPT_PHP': 1, 'FPT_TST': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1': 10, 'FTP_TRP.1': 4, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_ICT.1': 4, 'FTP_ITC': 1}}, 'cc_claims': {'O': {'O.PACE': 5, 'O.RND': 3, 'O.HW_AES': 4, 'O.MEM_ACCESS': 3, 'O.SFR_ACCESS': 3, 'O.FW_HW': 1}, 'T': {'T.RND': 1}, 'OE': {'OE.PACE': 1}, 'OSP': {'OSP.SM': 1}}, 'vendor': {'NXP': {'NXP': 2, 'NXP Semiconductors': 1}}, 'eval_facility': {'TSystems': {'T-Systems International': 79}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 16}}, 'DES': {'DES': {'DES': 4}, '3DES': {'Triple-DES': 2, 'TDES': 3}}, 'constructions': {'MAC': {'CMAC': 4}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 19}, 'ECC': {'ECC': 11}}, 'FF': {'DH': {'DH': 13, 'Diffie-Hellman': 5}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KA': {'Key Agreement': 17}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 28}}, 'PACE': {'PACE': 66}}, 'randomness': {'RNG': {'RND': 4, 'RNG': 8}}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {'NIST': {'P-256': 11, 'P-384': 15, 'NIST P-256': 1, 'NIST P-384': 1, 'secp256r1': 1, 'secp384r1': 1}, 'Brainpool': {'brainpoolP256r1': 2, 'brainpoolP384r1': 2, 'brainpoolP512r1': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 4, 'Physical Probing': 2, 'physical probing': 2, 'side channels': 1, 'side channel': 1, 'side-channels': 1, 'SPA': 2, 'DPA': 2, 'timing attacks': 1}, 'FI': {'Physical tampering': 1, 'physical tampering': 5, 'Malfunction': 12, 'malfunction': 3, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03109': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS186': 10, 'FIPS197': 3, 'FIPS PUB 186-4': 1}, 'BSI': {'AIS36': 3, 'AIS 36': 1}, 'RFC': {'RFC5639': 11, 'RFC 5639': 1}, 'ISO': {'ISO/IEC 7810:2003': 1}, 'X509': {'X.509': 2}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'entities. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 73 During its pre-operational phases the TOE interacts with the Integrator and the': 1}}}.
    • The st_filename property was set to 0957V2b_pdf.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V4-2022']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V2-2021', 'BSI-DSZ-CC-0919-V2-2021']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V4-2022']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V2-2021', 'BSI-DSZ-CC-0919-V2-2021']}}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0978-2016']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0978-2016']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V3-2021']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V4-2021']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V3-2021']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V4-2021']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]} values added.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0957V2b_pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V4-2022', 'BSI-DSZ-CC-0918-2020']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V4-2022', 'BSI-DSZ-CC-0918-2020']}, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V4-2021']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V4-2021']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}]} values added.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V4-2022', 'BSI-DSZ-CC-0918-V3-2022', 'BSI-DSZ-CC-0918-V2-2021', 'BSI-DSZ-CC-0918-2020']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V4-2022', 'BSI-DSZ-CC-0918-V3-2022', 'BSI-DSZ-CC-0918-V2-2021', 'BSI-DSZ-CC-0918-2020']}}} data.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) - ...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0077V2b_pdf.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) - ...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0077V2b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 28.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0957-V2']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0957-V2']}}} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-00845-V2-2013', 'BSI-DSZ-CC-0845-V2']}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '0957V2a_pdf.pdf', 'st_filename': '0957V2b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0957-2015': 6, 'BSI-DSZ-CC-0957-V2-2016': 48}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 13, 'EAL 2': 4, 'EAL 6': 4}}}}, 'cc_sar': {'__update__': {'ALC': {'__delete__': ['ALC_LCD']}, 'AVA': {'__update__': {'AVA_VAN.5': 6}}}}, 'cc_sfr': {'__update__': {'FCS': {'__insert__': {'FCS_COP': 6, 'FCS_CKM': 4}}}}, 'vendor': {'__update__': {'NXP': {'__update__': {'NXP': 11}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__update__': {'DH': 2}}}, '__delete__': ['DSA']}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 3}}, 'KA': {'__update__': {'Key Agreement': 8, 'KA': 1}}}}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 7}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__insert__': {'ISO/IEC 18045': 4}, '__update__': {'ISO/IEC 15408': 4}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, '1.0 Release 2/P60C144PVE, Version 1.2, 27 October 2016, SRC Security Research & Consulting GmbH (confidential document) 9 specifically • AIS 1, Version 13, DurchfĂĽhrung der Ortsbesichtigung in der Entwicklungsumgebung': 1, 'Version 1.0 Release 2/P60C144PVE, Version 1.3, 25 October 2016, T-Systems International GmbH (confidential document) [10] Guidance Documentation BSI-DSZ-CC-0957-V2-2016, Operational Guidance for users and': 1, 'Y/B/X)/yVE, BSI-DSZ-CC-0978, Version 2, 17 December 2015, TĂśV Informationstechnik GmbH (confidential document) [14] Product Data Sheet, SmartMX2 family P60x080/144 VA/VE, Secure high performance smart card': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 5, 'EAL4 augmented': 3}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_TDS': 2}}, 'AGD': {'__update__': {'AGD_PRE.1': 3}}, 'AVA': {'__update__': {'AVA_VAN.5': 10}}, 'ASE': {'__update__': {'ASE_TSS.2': 2}}}, '__delete__': ['ACE']}, 'cc_sfr': {'__update__': {'FCS': {'__insert__': {'FCS_CKM': 51, 'FCS_COP': 59}, '__update__': {'FCS_RNG': 6, 'FCS_CKM.4': 45, 'FCS_COP.1': 15}}, 'FDP': {'__insert__': {'FDP_ITC': 8, 'FDP_SDI': 1, 'FDP_RIP': 1, 'FDP_UIT': 1}, '__update__': {'FDP_ACF': 2, 'FDP_ACF.1': 9, 'FDP_SDI.2': 8, 'FDP_RIP.1': 7, 'FDP_ACC.1': 13}, '__delete__': ['FDP_UCT.1.1', 'FDP_UIT.1.1']}, 'FIA': {'__insert__': {'FIA_UAU': 18, 'FIA_SOS': 1, 'FIA_UID': 1, 'FIA_USB': 1}, '__update__': {'FIA_ATD.1': 10, 'FIA_UID.1': 14, 'FIA_UAU.1': 5}}, 'FMT': {'__insert__': {'FMT_SMR': 1, 'FMT_MSA.1': 2}, '__update__': {'FMT_LIM': 6, 'FMT_SMF.1': 10, 'FMT_MSA.3': 6}}, 'FPT': {'__insert__': {'FPT_FLS': 1, 'FPT_PHP': 1, 'FPT_TST': 1}, '__update__': {'FPT_EMS': 6}}, 'FTP': {'__insert__': {'FTP_ITC': 1}}}}, 'cc_claims': {'__delete__': ['D']}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 16}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 4}}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'CMAC': 4}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDSA': {'__update__': {'ECDSA': 19}}, 'ECC': {'__update__': {'ECC': 11}}}}, 'FF': {'__update__': {'DH': {'__update__': {'DH': 13}}}, '__delete__': ['DSA']}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 2}}, 'KA': {'__delete__': ['KA']}}}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'TLS': {'__update__': {'TLS': 28}}}}, 'PACE': {'__update__': {'PACE': 66}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 8}}}, '__delete__': ['TRNG']}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'physical probing': 2}}, 'FI': {'__update__': {'Malfunction': 12}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'BSI': {'__delete__': ['AIS 31']}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'entities. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 73 During its pre-operational phases the TOE interacts with the Integrator and the': 1}, '__delete__': ['. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST', 'l entities. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 73 During its pre-operational phases the TOE interacts with the Integrator and the']}}}} data.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V3-2021', 'BSI-DSZ-CC-0831-V4-2021', 'BSI-DSZ-CC-0831-V2-2020']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0919-V2-2021']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V3-2021', 'BSI-DSZ-CC-0831-V4-2021', 'BSI-DSZ-CC-0831-V2-2020']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0919-V2-2021']}}} data.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) - ...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0077V2b_pdf.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/zertifizierung', 'http://www.sogisportal.eu/', 'http://www.commoncriteriaportal.org/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.phy.duke.edu/~rgb/General/dieharder/dieharder-3.31.0.tgz', 'http://csrc.nist.gov/groups/ST/toolkit/rng/documents/sts-2.1.1.zip']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0957-2015': 4, 'BSI-DSZ-CC-0978-2016': 10, 'BSI-DSZ-CC-0957-V2-2016': 84}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0077-V2-2015': 4}}, 'cc_security_level': {'EAL': {'EAL 4': 14, 'EAL 5': 10, 'EAL 1': 7, 'EAL 2': 5, 'EAL 5+': 1, 'EAL 6': 5, 'EAL 3': 4, 'EAL 7': 4, 'EAL 4 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.5': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 2, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 2, 'ALC_CMS.5': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2, 'ALC_DVS.2': 1, 'ALC_FLR.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 2, 'ALC_TAT.2': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.3': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 5, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1, 'AVA_VAN': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FCS': {'FCS_RNG.1': 1}, 'FIA': {'FIA_UID.1': 1, 'FIA_UAU.4': 1, 'FIA_UAU.5': 1}, 'FTP': {'FTP_ITC.1': 1}}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 10, 'NXP Semiconductors': 4}}, 'eval_facility': {'TUV': {'TĂśV Informationstechnik': 1}, 'SRC': {'SRC Security Research & Consulting': 3}, 'TSystems': {'T-Systems International': 13}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'constructions': {'MAC': {'CMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 3}}, 'FF': {'DH': {'DH': 6, 'Diffie-Hellman': 2}, 'DSA': {'DSA': 6}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 7}, 'KA': {'Key Agreement': 9, 'KA': 13}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 6}}, 'PACE': {'PACE': 9}}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX2': 2}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 2}, 'FI': {'malfunction': 1, 'fault injection': 2}, 'other': {'JIL': 2}}, 'technical_report_id': {'BSI': {'BSI TR-03109-2': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-2': 2, 'FIPS 186': 5, 'FIPS 197': 2}, 'BSI': {'AIS 34': 2, 'AIS 36': 5, 'AIS 26': 3, 'AIS 25': 1, 'AIS 20': 3, 'AIS 1': 1, 'AIS 31': 1, 'AIS 32': 1, 'AIS 46': 1}, 'RFC': {'RFC 5639': 5}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'on 1.0 Release 2/P60C144PVE, Version 1.2, 27 October 2016, SRC Security Research & Consulting GmbH (confidential document) 9 specifically • AIS 1, Version 13, DurchfĂĽhrung der Ortsbesichtigung in der Entwicklungsumgebung': 1, 'odule Version 1.0 Release 2/P60C144PVE, Version 1.3, 25 October 2016, T-Systems International GmbH (confidential document) [10] Guidance Documentation BSI-DSZ-CC-0957-V2-2016, Operational Guidance for users and': 1, '/080yVA/yVA(Y/B/X)/yVE, BSI-DSZ-CC-0978, Version 2, 17 December 2015, TĂśV Informationstechnik GmbH (confidential document) [14] Product Data Sheet, SmartMX2 family P60x080/144 VA/VE, Secure high performance smart card': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0978-2016': 2, 'BSI-DSZ-CC-0957-V2': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0077-V2-2015': 2, 'BSI-CC-PP-0035-2007': 1, 'BSI-CC-PP-0073-2014': 1}}, 'cc_security_level': {'EAL': {'EAL4': 4, 'EAL 6+': 1, 'EAL 4': 4, 'EAL 6': 1, 'EAL4 augmented': 2, 'EAL 6 augmented': 1}}, 'cc_sar': {'ACE': {'ACE_ENC': 1, 'ACE_MAC': 1}, 'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1, 'ADV_IMP.1': 3, 'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 2, 'ALC_DEL.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.5': 7}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1}, 'FCS': {'FCS_RNG': 5, 'FCS_RNG.1': 20, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM.4': 43, 'FCS_CKM.1': 16, 'FCS_CKM.2': 8, 'FCS_COP.1': 9, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACF': 1, 'FDP_ACC.2': 17, 'FDP_ACF.1': 8, 'FDP_SDI.2': 7, 'FDP_RIP.1': 6, 'FDP_ETC.1': 7, 'FDP_ITC.1': 20, 'FDP_UCT.1': 8, 'FDP_UIT.1': 7, 'FDP_ITC.2': 14, 'FDP_ACC.1': 12, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_SDI.1': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_RIP.1.1': 1, 'FDP_IFC': 1, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_IFC.1': 8, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_ATD.1': 11, 'FIA_SOS.1': 3, 'FIA_UAU.4': 6, 'FIA_UAU.5': 6, 'FIA_UID.1': 15, 'FIA_USB.1': 6, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.4.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UAU.1': 1}, 'FMT': {'FMT_LIM': 5, 'FMT_LIM.1': 25, 'FMT_LIM.2': 23, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMF.1': 9, 'FMT_SMR.1': 6, 'FMT_MSA.3': 4, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_EMS': 5, 'FPT_EMS.1': 15, 'FPT_EMS.1.1': 2, 'FPT_EMS.1.2': 2, 'FPT_FLS.1': 11, 'FPT_PHP.3': 10, 'FPT_TST.1': 7, 'FPT_FLS.1.1': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1': 10, 'FTP_TRP.1': 4, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_ICT.1': 4}}, 'cc_claims': {'D': {'D.TCOS.ASE': 1}, 'O': {'O.PACE': 5, 'O.RND': 3, 'O.HW_AES': 4, 'O.MEM_ACCESS': 3, 'O.SFR_ACCESS': 3, 'O.FW_HW': 1}, 'T': {'T.RND': 1}, 'OE': {'OE.PACE': 1}, 'OSP': {'OSP.SM': 1}}, 'vendor': {'NXP': {'NXP': 2, 'NXP Semiconductors': 1}}, 'eval_facility': {'TSystems': {'T-Systems International': 79}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 21}}, 'DES': {'DES': {'DES': 10}, '3DES': {'Triple-DES': 2, 'TDES': 3}}, 'constructions': {'MAC': {'CMAC': 7}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 42}, 'ECC': {'ECC': 42}}, 'FF': {'DH': {'DH': 46, 'Diffie-Hellman': 5}, 'DSA': {'DSA': 44}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 20}, 'KA': {'Key Agreement': 17, 'KA': 50}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 27}}, 'PACE': {'PACE': 82}}, 'randomness': {'TRNG': {'TRNG': 5}, 'RNG': {'RNG': 17, 'RND': 4}}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {'NIST': {'P-256': 11, 'P-384': 15, 'NIST P-256': 1, 'NIST P-384': 1, 'secp256r1': 1, 'secp384r1': 1}, 'Brainpool': {'brainpoolP256r1': 2, 'brainpoolP384r1': 2, 'brainpoolP512r1': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 4, 'Physical Probing': 2, 'physical probing': 1, 'side channels': 1, 'side channel': 1, 'side-channels': 1, 'SPA': 2, 'DPA': 2, 'timing attacks': 1}, 'FI': {'Physical tampering': 1, 'physical tampering': 5, 'Malfunction': 14, 'malfunction': 3, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03109': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS186': 10, 'FIPS197': 3, 'FIPS PUB 186-4': 1}, 'BSI': {'AIS36': 3, 'AIS 31': 1, 'AIS 36': 1}, 'RFC': {'RFC5639': 11, 'RFC 5639': 1}, 'ISO': {'ISO/IEC 7810:2003': 1}, 'X509': {'X.509': 2}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, '. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST': 1, 'l entities. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 73 During its pre-operational phases the TOE interacts with the Integrator and the': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'a81e03979b196966503ad66d6e000306e08490e0c2459ede7dafab345d272d87', 'st_pdf_hash': '998bd15748d1ca2359fcdbb3bb287968e27f6dad0982e89e20dccc1a6e8f6195', 'report_txt_hash': 'a2ccef9d4f9794e51c870c876af68ced7cb8e6c0818d17a811994e87f324cacf', 'st_txt_hash': 'e374f5f87c0e498be7ed75904e3410f87e9b6a3a15ce2509a20df4ddf2ed7677'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 6}, 'rules_asymmetric_crypto': {'ECDSA': 6, 'ECC': 3, 'DH': 6, 'Diffie-Hellman': 2, 'DSA': 6}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'PACE': 9, 'MAC': 7, 'TLS': 6}, 'rules_randomness': {'RNG': 2}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {'malfunction': 1, 'side channel': 2, 'fault injection': 2}} values inserted.
    • The st_keywords property was updated, with the {'rules_ecc_curves': {'__insert__': {'NIST P-256': 1, 'NIST P-384': 1}, '__update__': {'P-256': 5, 'P-384': 7}}} data.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 19.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V4-2022']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V4-2022']}}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V4-2022']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V4-2022']}}} data.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V2-2020', 'BSI-DSZ-CC-0918-2020', 'BSI-DSZ-CC-0831-V4-2021', 'BSI-DSZ-CC-0918-V2-2021', 'BSI-DSZ-CC-0918-V3-2022', 'BSI-DSZ-CC-0831-V3-2021']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V2-2020', 'BSI-DSZ-CC-0918-2020', 'BSI-DSZ-CC-0831-V4-2021', 'BSI-DSZ-CC-0918-V2-2021', 'BSI-DSZ-CC-0918-V3-2022', 'BSI-DSZ-CC-0831-V3-2021']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0957-V2', 'BSI-DSZ-CC-0978-2016']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0957-V2', 'BSI-DSZ-CC-0978-2016']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V2-2020', 'BSI-DSZ-CC-0831-V4-2021', 'BSI-DSZ-CC-0919-V2-2021', 'BSI-DSZ-CC-0831-V3-2021', 'BSI-DSZ-CC-1035-2017']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V2-2020', 'BSI-DSZ-CC-0831-V4-2021', 'BSI-DSZ-CC-0919-V2-2021', 'BSI-DSZ-CC-0831-V3-2021', 'BSI-DSZ-CC-1035-2017']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0978-2016', 'BSI-DSZ-CC-0957-2015']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0845-V2', 'BSI-DSZ-CC-0666-2012', 'BSI-DSZ-CC-0978-2016', 'BSI-DSZ-CC-0845-2012', 'BSI-DSZ-CC-0845-V2-2013', 'BSI-DSZ-CC-0957-2015', 'BSI-DSZ-CC-00845-V2-2013']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.0']}.
    • The directly_affected_by property was set to {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V2-2020', 'BSI-DSZ-CC-0831-V4-2021', 'BSI-DSZ-CC-0919-V2-2021', 'BSI-DSZ-CC-0831-V3-2021', 'BSI-DSZ-CC-1035-2017']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "3f22bd3eaef5d64d",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "cert_id": "BSI-DSZ-CC-0957-V2-2016",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0831-V4-2021",
          "BSI-DSZ-CC-0831-V3-2021",
          "BSI-DSZ-CC-0919-V2-2021",
          "BSI-DSZ-CC-0831-V5-2022",
          "BSI-DSZ-CC-1035-2017",
          "BSI-DSZ-CC-0918-V5-2023",
          "BSI-DSZ-CC-0918-V4-2022",
          "BSI-DSZ-CC-0831-V2-2020"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0957-2015",
          "BSI-DSZ-CC-0978-2016"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0831-V4-2021",
          "BSI-DSZ-CC-0831-V3-2021",
          "BSI-DSZ-CC-0919-V2-2021",
          "BSI-DSZ-CC-0831-V5-2022",
          "BSI-DSZ-CC-1035-2017",
          "BSI-DSZ-CC-0918-V5-2023",
          "BSI-DSZ-CC-0918-V4-2022",
          "BSI-DSZ-CC-0831-V2-2020"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0957-2015",
          "BSI-DSZ-CC-0845-V2-2013",
          "BSI-DSZ-CC-0845-2012",
          "BSI-DSZ-CC-0666-2012",
          "BSI-DSZ-CC-0978-2016"
        ]
      }
    },
    "scheme_data": {
      "category": "Intelligent measuring systems",
      "cert_id": "BSI-DSZ-CC-0957-V2-2016",
      "certification_date": "18.11.2016",
      "enhanced": {
        "applicant": "Deutsche Telekom Security GmbH\nUntere Industriestra\u00dfe 20\n57250 Netphen",
        "assurance_level": "EAL4+,AVA_VAN.5",
        "certification_date": "18.11.2016",
        "description": "The Target of Evaluation (TOE) is the product TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA developed by T-Systems International GmbH. The TOE is a Smart Meter Security Module according to the Technical Guideline BSI TR-03109-2, Version 1.1 intended to be used by a Smart Meter Gateway in a Smart Metering System. The TOE serves as cryptographic service provider for the Smart Meter Gateway and supports the Smart Meter Gateway for its specific cryptographic needs. These cryptographic services cover the following issues: Digital Signature Generation, Digital Signature Verification, Key Agreement for TLS, Key Agreement for Content Data Encryption, Key Pair Generation, Random Number Generation, Component Authentication via the PACE Protocol with Negotiation of Session Keys, Secure Messaging, and Secure Storage of Key Material and further data relevant for the Gateway.",
        "entries": [
          {
            "description": "Re-Assessment",
            "id": "BSI-DSZ-CC-0957-V2-2016-RA-01 (Ausstellungsdatum / Certification Date 27.09.2021)"
          },
          {
            "description": "TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE",
            "id": "BSI-DSZ-CC-0957-V2-2016 (Ausstellungsdatum / Certification Date 18.11.2016, g\u00fcltig bis / valid until 17.11.2026)"
          },
          {
            "description": "Security Target",
            "id": "BSI-DSZ-CC-0957-2015 (Ausstellungsdatum / Certification Date 09.02.2015, g\u00fcltig bis / valid until 09.02.2025)"
          }
        ],
        "evaluation_facility": "SRC Security Research \u0026 Consulting GmbH",
        "expiration_date": "17.11.2026",
        "product": "TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE",
        "protection_profile": "Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) - Schutzprofil f\u00fcr das Sicherheitsmodul der Kommunikationseinheit eines intelligenten Messsystems f\u00fcr Stoff- und Energiemengen Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015",
        "report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0957V2a_pdf.pdf?__blob=publicationFile\u0026v=1",
        "target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0957V2b_pdf.pdf?__blob=publicationFile\u0026v=1"
      },
      "product": "TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE",
      "subcategory": "Security module for an Smart Metering Gateway",
      "url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Smartmeter_Sicherheitsmodule/0957_0957V2_0957V2RA1.html",
      "vendor": "Deutsche Telekom Security GmbH"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0919-V2-2021",
          "BSI-DSZ-CC-0822-V4-2023",
          "BSI-DSZ-CC-0918-V3-2022",
          "BSI-DSZ-CC-0918-V2-2021",
          "BSI-DSZ-CC-0918-V5-2023",
          "BSI-DSZ-CC-0918-V4-2022",
          "BSI-DSZ-CC-0918-2020"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0978-2016"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0918-2020",
          "BSI-DSZ-CC-0919-V2-2021",
          "BSI-DSZ-CC-0822-V4-2023",
          "BSI-DSZ-CC-0918-V2-2021",
          "BSI-DSZ-CC-0918-V5-2023",
          "BSI-DSZ-CC-0918-V4-2022",
          "BSI-DSZ-CC-0918-V3-2022"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0978-2016"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "T-Systems International GMBH",
  "manufacturer_web": "https://www.t-systems.de/",
  "name": "TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA",
  "not_valid_after": "2026-11-18",
  "not_valid_before": "2016-11-18",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "report_filename": "0957V2a_pdf.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5",
        "cc_version": "PP conformant Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-0957-V2-2016",
        "cert_item": "TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE",
        "cert_lab": "BSI",
        "developer": "T-Systems International GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) - Schutzprofil f\u00fcr das Sicherheitsmodul der Kommunikationseinheit eines intelligenten Messsystems f\u00fcr Stoff- und Energiemengen Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015"
      },
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 2
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0957-2015": 6,
          "BSI-DSZ-CC-0957-V2-2016": 48,
          "BSI-DSZ-CC-0978-2016": 10
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0077-V2-2015": 4
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 1,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 1,
          "ADV_INT.3": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 1,
          "ADV_TDS.5": 1,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 2,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 2,
          "ALC_CMS.5": 1,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 1,
          "ALC_FLR": 3,
          "ALC_FLR.1": 1,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 2,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 1,
          "ALC_TAT.3": 1
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_COV.3": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 1,
          "ATE_DPT.4": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 1,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 1,
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 7,
          "EAL 2": 4,
          "EAL 3": 4,
          "EAL 4": 13,
          "EAL 4 augmented": 3,
          "EAL 5": 10,
          "EAL 5+": 1,
          "EAL 6": 4,
          "EAL 7": 4
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 4,
          "FCS_COP": 6,
          "FCS_RNG.1": 1
        },
        "FIA": {
          "FIA_UAU.4": 1,
          "FIA_UAU.5": 1,
          "FIA_UID.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "1.0 Release 2/P60C144PVE, Version 1.2, 27 October 2016, SRC Security Research \u0026 Consulting GmbH (confidential document) 9 specifically \u2022 AIS 1, Version 13, Durchf\u00fchrung der Ortsbesichtigung in der Entwicklungsumgebung": 1,
          "Version 1.0 Release 2/P60C144PVE, Version 1.3, 25 October 2016, T-Systems International GmbH (confidential document) [10] Guidance Documentation BSI-DSZ-CC-0957-V2-2016, Operational Guidance for users and": 1,
          "Y/B/X)/yVE, BSI-DSZ-CC-0978, Version 2, 17 December 2015, T\u00dcV Informationstechnik GmbH (confidential document) [14] Product Data Sheet, SmartMX2 family P60x080/144 VA/VE, Secure high performance smart card": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX2": 2
        }
      },
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 7
        },
        "TLS": {
          "TLS": {
            "TLS": 6
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "KA": 1,
          "Key Agreement": 8
        },
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "SRC": {
          "SRC Security Research \u0026 Consulting": 3
        },
        "TSystems": {
          "T-Systems International": 13
        },
        "TUV": {
          "T\u00dcV Informationstechnik": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "fault injection": 2,
          "malfunction": 1
        },
        "SCA": {
          "side channel": 2
        },
        "other": {
          "JIL": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 20": 3,
          "AIS 25": 1,
          "AIS 26": 3,
          "AIS 31": 1,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 36": 5,
          "AIS 46": 1
        },
        "FIPS": {
          "FIPS 180-2": 2,
          "FIPS 186": 5,
          "FIPS 197": 2
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "RFC": {
          "RFC 5639": 5
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 6
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 3
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-03109-2": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 11,
          "NXP Semiconductors": 4
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit ind er Informationstechnik",
      "/CreationDate": "D:20161202073353+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smart Meter Security Module\"",
      "/ModDate": "D:20161202075632+01\u002700\u0027",
      "/Producer": "LibreOffice 4.2",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-0957-V2-2016",
      "pdf_file_size_bytes": 1139869,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.bsi.bund.de/AIS",
          "http://www.sogisportal.eu/",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 38
    },
    "st_filename": "0957V2b_pdf.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 11
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 19
          }
        },
        "FF": {
          "DH": {
            "DH": 13,
            "Diffie-Hellman": 5
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0957-V2": 3,
          "BSI-DSZ-CC-0978-2016": 2
        }
      },
      "cc_claims": {
        "O": {
          "O.FW_HW": 1,
          "O.HW_AES": 4,
          "O.MEM_ACCESS": 3,
          "O.PACE": 5,
          "O.RND": 3,
          "O.SFR_ACCESS": 3
        },
        "OE": {
          "OE.PACE": 1
        },
        "OSP": {
          "OSP.SM": 1
        },
        "T": {
          "T.RND": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0035-2007": 1,
          "BSI-CC-PP-0073-2014": 1,
          "BSI-CC-PP-0077-V2-2015": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 3,
          "ADV_TDS": 2,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 3,
          "ALC_DVS.1": 1,
          "ALC_FLR.1": 2,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_TSS.2": 2
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 10
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 5,
          "EAL 6": 1,
          "EAL 6 augmented": 1,
          "EAL 6+": 1,
          "EAL4": 4,
          "EAL4 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 1
        },
        "FCS": {
          "FCS_CKM": 51,
          "FCS_CKM.1": 16,
          "FCS_CKM.2": 8,
          "FCS_CKM.4": 45,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 59,
          "FCS_COP.1": 15,
          "FCS_RNG": 6,
          "FCS_RNG.1": 20,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC.1": 13,
          "FDP_ACC.2": 17,
          "FDP_ACC.2.1": 1,
          "FDP_ACC.2.2": 1,
          "FDP_ACF": 2,
          "FDP_ACF.1": 9,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_ETC.1": 7,
          "FDP_ETC.1.1": 1,
          "FDP_ETC.1.2": 1,
          "FDP_IFC": 1,
          "FDP_IFC.1": 8,
          "FDP_ITC": 8,
          "FDP_ITC.1": 20,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITC.2": 14,
          "FDP_ITT.1": 1,
          "FDP_RIP": 1,
          "FDP_RIP.1": 7,
          "FDP_RIP.1.1": 1,
          "FDP_SDI": 1,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 8,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UCT.1": 8,
          "FDP_UIT": 1,
          "FDP_UIT.1": 7,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_ATD.1": 10,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 1,
          "FIA_SOS.1": 3,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 18,
          "FIA_UAU.1": 5,
          "FIA_UAU.4": 6,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 6,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID": 1,
          "FIA_UID.1": 14,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB": 1,
          "FIA_USB.1": 6,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_LIM": 6,
          "FMT_LIM.1": 25,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 23,
          "FMT_LIM.2.1": 2,
          "FMT_MSA.1": 2,
          "FMT_MSA.3": 6,
          "FMT_SMF.1": 10,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 1,
          "FMT_SMR.1": 6,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_EMS": 6,
          "FPT_EMS.1": 15,
          "FPT_EMS.1.1": 2,
          "FPT_EMS.1.2": 2,
          "FPT_FLS": 1,
          "FPT_FLS.1": 11,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 1,
          "FPT_PHP": 1,
          "FPT_PHP.3": 10,
          "FPT_PHP.3.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 7,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ICT.1": 4,
          "FTP_ITC": 1,
          "FTP_ITC.1": 10,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {
        "OutOfScope": {
          "entities. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 73 During its pre-operational phases the TOE interacts with the Integrator and the": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 66
        },
        "TLS": {
          "TLS": {
            "TLS": 28
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 17
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 2,
          "brainpoolP384r1": 2,
          "brainpoolP512r1": 2
        },
        "NIST": {
          "NIST P-256": 1,
          "NIST P-384": 1,
          "P-256": 11,
          "P-384": 15,
          "secp256r1": 1,
          "secp384r1": 1
        }
      },
      "eval_facility": {
        "TSystems": {
          "T-Systems International": 79
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 4,
          "RNG": 8
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "Malfunction": 12,
          "Physical tampering": 1,
          "fault injection": 1,
          "malfunction": 3,
          "physical tampering": 5
        },
        "SCA": {
          "DPA": 2,
          "Leak-Inherent": 4,
          "Physical Probing": 2,
          "SPA": 2,
          "physical probing": 2,
          "side channel": 1,
          "side channels": 1,
          "side-channels": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 36": 1,
          "AIS36": 3
        },
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 2,
          "CCMB-2012-09-004": 2
        },
        "FIPS": {
          "FIPS PUB 186-4": 1,
          "FIPS186": 10,
          "FIPS197": 3
        },
        "ISO": {
          "ISO/IEC 7810:2003": 1
        },
        "RFC": {
          "RFC 5639": 1,
          "RFC5639": 11
        },
        "X509": {
          "X.509": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 16
          }
        },
        "DES": {
          "3DES": {
            "TDES": 3,
            "Triple-DES": 2
          },
          "DES": {
            "DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 4
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03109": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 2,
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "T-Systems International GmbH",
      "/CreationDate": "D:20161026142017+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/Keywords": "\"TCOS Security Module, Sicherheitsmodul, Smart Meter\"",
      "/ModDate": "D:20161026142017+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Subject": "TCOS Smart Meter Security Module Version 1.0 Release 1",
      "/Title": "Security Target TCOS Smart Meter Security Module (NXP)",
      "pdf_file_size_bytes": 1152948,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://csrc.nist.gov/groups/ST/toolkit/rng/documents/sts-2.1.1.zip",
          "http://www.phy.duke.edu/~rgb/General/dieharder/dieharder-3.31.0.tgz"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 76
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0077V2b_pdf.pdf",
        "pp_name": "Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) - ..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0957V2a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0957V2b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "a81e03979b196966503ad66d6e000306e08490e0c2459ede7dafab345d272d87",
    "report_txt_hash": "a2ccef9d4f9794e51c870c876af68ced7cb8e6c0818d17a811994e87f324cacf",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "998bd15748d1ca2359fcdbb3bb287968e27f6dad0982e89e20dccc1a6e8f6195",
    "st_txt_hash": "e374f5f87c0e498be7ed75904e3410f87e9b6a3a15ce2509a20df4ddf2ed7677"
  },
  "status": "active"
}